期刊文献+

瓦解注入码的新方法——ISR技术的研究和实现

Research and Implementation of ISR-New Approach Countering Code-Injection
下载PDF
导出
摘要 指令表随机化(ISR)技术是一种新型的保护系统免遭任何类型注入码攻击的通用方法。对系统指令表经过特殊的随机化处理,就可以在该系统上运行具有潜在漏洞的软件。攻击者如果不知道随机化算法的密钥,那么他注入的代码对于随机化后的处理器就是非法的,并且会导致运行异常。ISR技术可以用作一个低耗费的保护机制,也能够很方便地用来补充其他机制。 ISR (Instruction Set Randomization) is a new, general approach for safeguarding systems against any type of code-injection attack. Potentially vulnerable software can be executed on the system that has process-specific randomized instruction sets. An attacker who does not know the key to the randomization algorithm will inject code that is invalid for that randomized processor, causing a runtime exception. ISR can serve as a low-overhead protection mechanism, and can easily complement other mechanisms.
作者 袁奇 须文波
出处 《微电子学与计算机》 CSCD 北大核心 2007年第6期123-125,129,共4页 Microelectronics & Computer
关键词 注入码 仿真器 缓冲区溢出 code-injection emulator , buffer overflow
  • 相关文献

参考文献8

  • 1Wagner D,Foster J S,Brewer E A,et al.A first step towards automated detection of buffer overrun vulnerabilities[R].The ISOC Symposium on Network and Distributed System Security (SNDSS),2000:3~17
  • 2曾凤.缓冲区溢出攻击的防范策略[J].微电子学与计算机,2005,22(9):51-53. 被引量:3
  • 3Baratloo A,Singh N,Tsai T.Transparent run-time defense against stack smashing attacks[R].The USENIX Annual Technical Conference,2000
  • 4李健,王玲,董科军,李俊.基于Linux的网络入侵检测与防火墙集成系统的设计与实现[J].微电子学与计算机,2006,23(4):18-22. 被引量:9
  • 5Larochelle D,Evans D.Statically detecting likely buffer overflow vulnerabilities[J].The 10th USENIX Security Symposium,Aug.2001,8:177~190
  • 6Prasad M,Chiueh T.A binary rewriting defense against stack-based buffer overflow attacks[R].The USENIX Annual Technical Conference,June 2003:211~224
  • 7Prevelakis V,Spinellis D.Sandboxing applications[R].The USENIX Technical Annual Conference,2001:119~126
  • 8Bochs Emulator[EB/OL].http://bochs.sourceforge.net/

二级参考文献7

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部